/external/chromium/chrome/browser/ui/webui/options/ |
H A D | search_engine_manager_handler.cc | 244 DictionaryValue validity; local 245 validity.SetBoolean("name", edit_controller_->IsTitleValid(name)); 246 validity.SetBoolean("keyword", edit_controller_->IsKeywordValid(keyword)); 247 validity.SetBoolean("url", edit_controller_->IsURLValid(url)); 250 validity, indexValue);
|
/external/chromium_org/chrome/browser/ui/webui/options/ |
H A D | search_engine_manager_handler.cc | 278 base::DictionaryValue validity; local 279 validity.SetBoolean("name", edit_controller_->IsTitleValid(name)); 280 validity.SetBoolean("keyword", edit_controller_->IsKeywordValid(keyword)); 281 validity.SetBoolean("url", edit_controller_->IsURLValid(url)); 284 validity, indexValue); 307 // Recheck validity. It's possible to get here with invalid input if e.g. the
|
/external/chromium_org/content/browser/fileapi/ |
H A D | copy_or_move_file_validator_unittest.cc | 195 explicit TestCopyOrMoveFileValidatorFactory(Validity validity) argument 196 : validity_(validity) {} 208 explicit TestCopyOrMoveFileValidator(Validity validity) argument 209 : result_(validity == VALID || validity == POST_WRITE_INVALID 212 write_result_(validity == VALID || validity == PRE_WRITE_INVALID
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
H A D | FormAssociatedElement.cpp | 61 ValidityState* FormAssociatedElement::validity() function in class:WebCore::FormAssociatedElement
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | nssidentity.cc | 309 CERTValidity *validity; local 350 validity = CERT_CreateValidity(not_before, not_after); 351 if (!validity) { 352 LOG(LS_ERROR) << "Couldn't create validity"; 365 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); 407 if (validity) CERT_DestroyValidity(validity);
|
/external/chromium_org/third_party/libxml/src/ |
H A D | runsuite.c | 792 xmlChar *validity = NULL; local 822 validity = getString(cur, 823 "string(ts:expected/@validity)"); 824 if (validity == NULL) { 825 fprintf(stderr, "instanceDocument line %ld misses expected validity\n", 846 if (xmlStrEqual(validity, BAD_CAST "valid")) { 857 } else if (xmlStrEqual(validity, BAD_CAST "invalid")) { 864 test_log("instanceDocument line %ld has unexpected validity value%s\n", 865 xmlGetLineNo(cur), validity); 873 if (validity ! 889 xmlChar *validity = NULL; local [all...] |
/external/chromium_org/net/cert/ |
H A D | cert_verify_proc_nss.cc | 773 SECCertTimeValidity validity = CERT_CheckCertValidTimes( local 775 if (validity != secCertTimeValid)
|
H A D | x509_util_nss.cc | 112 CERTValidity* validity = CERT_CreateValidity( local 115 if (!validity) { 117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr; 123 validity, cert_request); 131 CERT_DestroyValidity(validity); 283 CERTValidity* validity = CERT_CreateValidity( local 287 if (!validity) 290 CERT_DestroyValidity(validity);
|
/external/chromium/net/base/ |
H A D | x509_certificate_nss.cc | 639 ParseDate(&cert_handle_->validity.notBefore, &valid_start_); 640 ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); 684 CERTValidity* validity = CERT_CreateValidity(now, not_after); local 686 validity, cert_request); 694 CERT_DestroyValidity(validity); 780 SECCertTimeValidity validity = CERT_CheckCertValidTimes( local 782 if (validity != secCertTimeValid)
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
H A D | x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter)
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter)
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter)
|
/external/openssl/include/openssl/ |
H A D | x509.h | 255 X509_VAL *validity; member in struct:x509_cinf_st 612 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) 613 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter)
|
/external/chromium_org/chrome/browser/ui/views/autofill/ |
H A D | autofill_dialog_views.cc | 2049 // Reset all validity marks for this section. 2241 ValidityMessages validity = delegate_->InputsAreValid(group.section, local 2243 MarkInputsInvalid(group.section, validity, validation_type == VALIDATE_FINAL); 2246 return !validity.HasErrors();
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.swt.gtk.linux.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.swt.win32.win32.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |